summaryrefslogtreecommitdiffstats
path: root/dom/security/test/csp/test_evalscript_allowed_by_strict_dynamic.html
blob: 29c3e87287e85e67ef31cb2b24cd994a47d10c97 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
<!DOCTYPE html>
<html>
<head>
  <meta charset="utf-8">
  <meta http-equiv="Content-Security-Policy" 
        content="script-src 'nonce-foobar' 'strict-dynamic' 'unsafe-eval'">
  <title>Bug 1439330  - CSP: eval is not blocked if 'strict-dynamic' is enabled
  </title>
  <script nonce="foobar" type="application/javascript" src="/tests/SimpleTest/SimpleTest.js">
  </script>
  <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css"/>
</head>
<body>
<script nonce="foobar">

/* Description of the test:
 * We apply the script-src 'nonce-foobar' 'strict-dynamic' 'unsafe-eval' CSP and
 * check if the eval function is allowed correctly by the CSP.
 */

SimpleTest.waitForExplicitFinish();

// start the test
try {
  eval("1");
  ok(true, "eval allowed by CSP");
}
catch (ex) {
  ok(false, "eval should be allowed by CSP");
}

SimpleTest.finish();

</script>
</body>
</html>